Netskope 安全漏洞(CVE-2022-4149)

admin 2023-11-30 04:59:25 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
Netskope 安全漏洞(CVE-2022-4149)

CVE编号

CVE-2022-4149

利用情况

暂无

补丁情况

N/A

披露时间

2022-11-28
漏洞描述
The Netskope client service (prior to R96) on Windows runs as NT AUTHORITY\SYSTEM which writes log files to a writable directory (C:\Users\Public\netSkope) for a standard user. The files are created and written with a SYSTEM account except one file (logplaceholder) which inherits permission giving all users full access control list. Netskope client restricts access to this file by allowing only read permissions as a standard user. Whenever the Netskope client service restarts, it deletes the logplaceholder and recreates, creating a race condition, which can be exploited by a malicious local user to create the file and set ACL permissions on the file. Once the file is created by a malicious user with proper ACL permissions, all files within C:\Users\Public\netSkope\ becomes modifiable by the unprivileged user. By using Windows pseudo-symlink, these files can be pointed to other places in the system and thus malicious users will be able to elevate privileges.
解决建议
"将组件 netskope 升级至 100 及以上版本"
参考链接
https://www.netskope.com/company/security-compliance-and-assurance/security-a...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 netskope netskope * Up to (excluding) 100
CVSS3评分 7.0
  • 攻击路径 本地
  • 攻击复杂度 高
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-367 检查时间与使用时间(TOCTOU)的竞争条件
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0